there is a problem with the data dictionary. the drop-down fields do not have all of the options that are needed. this is a problem with

Answers

Answer 1

There is a problem with the data dictionary. the drop-down fields do not have all of the options that are needed. this is a problem with data quality.

The design or execution of the data dictionary. It sounds as though the drop-down fields' options have not been properly adjusted to accommodate all relevant possibilities. You must check the data dictionary's setup and make sure that all relevant options are present in the drop-down fields in order to resolve the issue. This can need changing the data dictionary's settings or its underlying data sources, or both. In order to reflect changes in the data being analyzed, it is also crucial to make sure that the data dictionary is continuously updated. This can assist in avoiding reoccurring issues of the same nature.

Learn more about data dictionary here:

https://brainly.com/question/8897251

#SPJ4


Related Questions

how does sams card login?

Answers

Visit the Sam's Club cardholders' credit card gateway on the Synchrony website. Provide your login information. To have your username automatically filled in each time you log in using the same device, check the "Remember User ID" box.

If I have the app, do I still need my Sams card?

Sam's Club connected the cards you've saved in the Scan & Go app to your wallet on SamsClub.com. As a result, you can utilize any saved card information to make purchases at SamsClub.com and vice versa using your S&G account.

How can I determine whether my Sam's Club card is valid?

The membership expiration and renewal dates are both displayed on your online account and any order receipt. Online, at any Sam's Club, in person, or by contacting us, you can create, renew, or upgrade your membership.

To know more about login information visit:-

https://brainly.com/question/14419950

#SPJ4

find calculation number of days

Answers

To find the calculation of the number of days;

You can use the following formula:

Number of days = (Number of weeks * 7) + Number of extra days

For example, if you want to find the number of days in 3 weeks and 2 extra days, you can use the formula:

Number of days = (3 * 7) + 2

Number of days = 21 + 2

Number of days = 23

So, there are 23 days in 3 weeks and 2 extra days.

Alternatively, you can use a calendar to count the number of days between two dates. Simply count the number of days between the start date and the end date, inclusive.

Learn more about Calculation of the number of days at https://brainly.com/question/28012700

#SPJ11

True or False: Python allows programmers to break a statement into multiple lines

Answers

True. Python allows programmers to break a statement into multiple lines using the line continuation character, which is a backslash (\). This allows a single statement to span multiple lines and makes code easier to read and understand.

What is Statement ?

A statement is a written or verbal declaration by a person or group about a certain subject or topic. It is usually intended to provide information or to make an assertion. Statements can take the form of either a factual declaration or an opinion. Factual statements are based on facts, evidence, and research, while opinion statements are based on beliefs, feelings, and values.

Statements can be made publicly, such as in a speech or in a press conference, or privately, such as in a personal conversation or a letter. Regardless of how they are delivered, statements are intended to be taken seriously and often require a response.

To learn more about Statement

https://brainly.com/question/28551792

#SPJ4

in 2020, there were 150 million more social network users worldwide than before the pandemic. (True or False)

Answers

Because there will be roughly 1 billion usd more social media members globally in 2020 than we had anticipated that before pandemic—more than the whole population of Russia—this assertion is accurate.

What does the term "network computer" mean?

An interconnected system of nodes that can send, receive, and exchange data, audio, and video traffic is known as a computer network, sometimes known as a data network. Servers or modems are illustrations of nodes that make up a network. Endpoint users often utilize computer networks to exchange resources and communicate.

In India, whose network is the strongest?

According to a recent study, Airtel offers superior gaming, video streaming, and download speeds while Reliance Jio offers the most reliable 4G services in India also with greatest coverage.

To know more about Network visit:

https://brainly.com/question/1074921

#SPJ1

which one is better mac vs pc?

Answers

Windows machines are more readily available, more affordable, and compatible with a wider range of software, while Macs offer a more streamlined user experience.

Which is superior, the Mac or the PC?

PCs can be upgraded more simply and offer a wider variety of component possibilities. If a Mac can be upgraded, the sole options are memory and the storage disk. A PC user has a variety of motherboards, processors, storage devices, video, graphics, audio, and memory options.

Windows or Mac, which is superior?

The two operating systems are comparable in many situations, but ultimately Windows triumphs. But, you will have your own priority weights based on the requirements of your OS. Windows is a no-brainer, for instance, if gaming is your life. If you have an artistic nature, then a Mac would probably serve you better.

To know more about  mac vs pc visit:-

https://brainly.com/question/12996553

#SPJ4

How do you check if a string array c++?

Answers

Answer:

in c++ we look for the court<<< sum,

most panelboards, switchboards, and switchgear are listed to product standards that do not require short-circuit testing to determine their sccr, but rather assign a default sccr.

Answers

A default short-circuits current rating (SCCR) is frequently assigned to panelboards, switchboards, and switchgear according to product standards that take into account the device's design, construction, and other aspects.

Which NEC code requirement mandates the presence of overcurrent protection on the secondary in panelboards powered by transformers?

The overcurrent protection mandated by 408.36 must be installed on the secondary side of a transformer when a panelboard is supplied by it.

Is it acceptable to install fuses on the load side of the service switch as part of the service equipment in panel boards?

Any sort of fuse must be fitted on the load side of any switch in a panelboard. One exception is that fuses installed as part of service equipment in conformity with 230.94's rules may be placed on the service switch's line side.

to know more about sccr here:

brainly.com/question/30396604

#SPJ4

what is a white screen for light?

Answers

A projector screen with a white background is one that is made to refract as much light possible. It is frequently used in places that call for a high degree of high contrast, like classrooms and meeting areas.

Why choose a projector over a television?

TVs produce light; projectors mirror it. Reflected light is more pleasant and less taxing. Larger pictures are produced by projectors. Larger pictures make watching simpler and less taxing.

Do small projectors merit purchase?

If size and mobility are important to you, mini projectors are worthwhile investments. They are compact, light, and frequently come with speakers, a built-in Android, and a charger. However, in order to accomplish those other goals, they forego image clarity and brightness.

To know more about Projector visit:

https://brainly.com/question/30682622

#SPJ4

what is python of binary search ?

Answers

Python is a programming language, while binary search is an algorithm that is used to find a particular element in a sorted list.

In python, you can use the binary search algorithm to search for an element in a list by repeatedly dividing the search interval in half until the element is found.

The basic idea of binary search is to use the information that the list is sorted and reduce the time complexity to O(log n).

Here is an example of how you can implement binary search in python:
```
def binary_search(arr, low, high, x):
 if high >= low:
   mid = (high + low) // 2

   # If the element is present at the middle
   if arr[mid] == x:
     return mid

   # If the element is smaller than mid, then it can only be present in the left subarray
   elif arr[mid] > x:
     return binary_search(arr, low, mid - 1, x)

   # Else the element can only be present in the right subarray
   else:
     return binary_search(arr, mid + 1, high, x)

 else:
   # Element is not present in the array
   return -1
```
Learn more about python here: https://brainly.com/question/26497128.

#SPJ11

which layer of the osi model manages connecting applications to applications?

Answers

The application layer is found at Layer 7, the top layer of the Open Systems Interconnection (OSI) communications paradigm. It ensures that software running on multiple networks and computer systems may effectively communicate with one another.

Under what OSI layer are the communicating applications identified?

Users communicate with computers at the OSI model's Application layer. The application layer is in charge of locating and verifying the availability of the intended communication partner and figuring out whether there are enough resources available for the planned conversation.

What layer establishes a link between two applications?

Two apps that are operating on various hosts can connect end-to-end via the transport layer. Obviously, the transport layer offers this logical link whether the hosts are connected to the same network or not.

To know more about application layer visit:-

https://brainly.com/question/29671395

#SPJ4

what file extension is used for drawings

Answers

An image drawing file is a specific kind of file called a drawn file. This has the file extension. drawn.

What is the name of a drawing file?

A strong relationship exists between DWG files and CAD (computer-aided design) software. Its name, originally an acronym for the term "drawing," refers to a file containing vector graphics in two and three dimensions. DWG files are typically used by drafters, architects, and engineers to create design sketches.

What is a drawing extension?

Drawings are a common term for 2D CAD files, whereas models, parts, and assemblies are common terms for 3D files. DWG, DXF, DGN, and are common CAD file extensions.

To know more about file extension visit:-

https://brainly.com/question/21419607

#SPJ4

what type of network hardware should you implement to prevent this from happening again?

Answers

I need to implement  network hardware called firewall. Firewall provide a barrier between your organization's network and public networks such as the Internet. It also prevent unauthorized access to an organization's private network.

What is network hardware and its types?

Network hardware, also known as network equipment or computer network devices, is the electronic devices required for communication and interaction between devices on a computer network. Specifically, it mediates data transfers in computer networks.

What are basic network hardware devices?

Routers, hubs, switches, and bridges are examples of network hardware devices. Basic device of a computer network is modem that allows your computer to connect to  Internet through a telephone line.

Network hardware that amplifies network signals is called amplifier. 

To learn more about Network hardware visit:

https://brainly.com/question/28040336

#SPJ4

You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the Internet to provide users with Internet access. Since doing so, it has became to your attention an intruder has invaded your network from the Internet on three separate occasions. What type of network hardware should you implement to prevent this from happening again?

write a conditional that multiplies the value associated with pay by one-and-a-half if worked_overtime is associated with true.

Answers

The code multiplies the value of the variable pay by 1.5 if worked_overtime is true.

Here's an example of a conditional statement in JavaScript that multiplies the value of pay by 1.5 if worked_overtime is true:

if (worked_overtime === true) {

 pay = pay * 1.5;

}

Note that worked_overtime is assumed to be a boolean variable that is either true or false.

The given code uses a conditional statement to check whether the value of the variable worked_overtime is true. If the value is true, the code multiplies the value of the variable pay by 1.5 and assigns the result back to the same variable pay. This means that if the condition is true, the pay value will be updated to 1.5 times its original value, which represents a 50% increase in pay.

Note that the code assumes that the variables worked_overtime and pay are previously defined and have valid values assigned to them.

Learn more about conditional statement here:

https://brainly.com/question/30461684

#SPJ4

Are the following scenarios a breach of confidentiality, integrity or availability? Explain your reasoning.



In September of 2017, Equifax announced a data breach that exposed the personal information of 147 million people. How did this exposure breach the CIA Triad?



Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. What type of breach is the downloading of malware?



An email phishing attack results in ransomware, in which the files and folders on a computer are encrypted. What type of breach is ransomware?



How do fake social media accounts breach the CIA Triad?

Answers

The Equifax data breach violated confidentiality by exposing the personal information of 147 million people. Social Security numbers and other private information were accessible to the attackers.

What are the data's confidentiality, accessibility, and integrity?

You must be assured that your data is secure against unauthorised access. Integrity – Your data must be trustworthy. Accessibility – You must have access to your data.

What constitutes a violation of integrity?

Failure to act with integrity is BREACH. For instance, if you promise to be on time for a meeting then arrive late, your tardiness is seen as a BREACH of INTEGRITY. BREAKS destroy TRUST; they render you unreliable and make you appear less important to the group.

To know  more about data visit:-

https://brainly.com/question/11941925

#SPJ1

there are four types of cloud storage available. which storage type is ephemeral or non-persistent?

Answers

It's essentially utilized for the root filesystem and working arrangement of the occurrence. The flavor of the instance and the image used determine the size of ephemeral storage.

Which type of non-persistent cloud storage is there?

Storage that doesn't last: When the container, the worker node, or the cluster are taken out, your data may be lost. When you want to access data from the host's file system, development testing, or logging information like system logs or container logs, non-persistent storage is typically used.

Which four kinds of cloud storage are there?

The four main types of cloud computing are as follows: multiclouds, hybrid clouds, private clouds, and public clouds. Additionally, there are three primary kinds of cloud computing services: Software-as-a-Service, Platforms-as-a-Service, and Infrastructure-as-a-Service (IaaS)

To know more about filesystem visit :-

https://brainly.com/question/30092559

#SPJ4

what type of authentication is based on what the user has?

Answers

Because each biometric identification is distinct, it is harder to use them to hack accounts. The following list of biometrics kinds is typical: A user's fingerprints are used to verify authentication using fingerprint scanning.

What three methods of authentication are there?

Three categories of authentication factors exist: A token, like a bank card, is something you have; a password or personal identification number (PIN) is something you know; and biometrics, like voice and fingerprint recognition, is something you are.

What are the three methods for confirming user identity?

Authentication can be divided into three categories. The first is knowledge-based and involves something that only the identified individual would know, like a password or PIN number. The second is property-based, meaning the user is in possession of a personal authorization device, such as an access card, key, or key fob. The third is based on biology.

to know more about authentication here:

brainly.com/question/29752591

#SPJ4

How to login to cleveland state blackboard

Answers

To login to Cleveland State University's Blackboard, follow these steps:

1. Go to the Cleveland State University website.2. In the top right corner, click on the "MyCSU" link.3. This will take you to the login page for Cleveland State University's online portal. Enter your CSU ID and password in the designated fields.4. Once you have logged in, you should see a link to Blackboard on the left side of the page under the "Quick Links" section.5. Click on the Blackboard link to access the Blackboard platform.6. You should now be logged in to Blackboard and able to access your courses and other materials.

Based on the search results you provided, it seems that multiple universities have a tool called "Blackboard" that is used for course management. Specifically, results number 5 and 8 mention using Blackboard as a course management system that allows instructors to provide content and assignments to students in a user-friendly online interface.

Learn more about University:

https://brainly.com/question/29053191

#SPJ11

why do computers use zeros and ones?

Answers

Answer:

it's because those zeros and one's are the language of the computer

What three supported methods can be used to upgrade a host from ESXi 5.x to ESXi 6.x? (Choose three.)
A. vSphere Update Manager
B. vihostupdate
C. esxcli
D. vSphere Auto Deploy
E. esxupdate

Answers

three supported methods can be used to upgrade a host from ESXi 5.x to ESXi 6.x are vSphere Update Manager, esxcli and vSphere Auto Deploy.

To upgrade ESXi 5.x hosts to ESXi 6.0 hosts, VMware offers numerous options.

The host that will be updated and the upgrade technique you employ will determine the specifics and amount of support for an upgrade to ESXi 6.0. Ensure that the upgrade path from your current version of ESXi to the version you are upgrading to is supported. See VMware Product Interoperability

Asynchronously released drivers, third-party customizations, interactive upgrades from CDs or DVDs, automated upgrades, and vSphere Update Manager upgrades are all options for upgrading an ESXi 5.x host. The custom VIBs are migrated when an ESXi 5.x host with custom VIBs is upgraded to version 6.0. See Updating Hosts Using Third-Party Custom VIBs.

Techniques approved for straight ESXi upgrading

learn more about  upgrade a host here:

https://brainly.com/question/30434249

#SPJ4

True/False. zone bit recording is how disk manufacturers ensure that a platter's outer tracks store as much data as possible.

Answers

It is false that zone bit recording is how disk manufacturers ensure that a platter's outer tracks store as much data as possible.

What is zone bit recording?

Zone bit recording (ZBR) is a hard disk drive technology that is used to increase the storage density of a disk by varying the number of sectors per track on different zones of the disk. This allows the outer tracks to store more data than the inner tracks, which can help to increase the overall capacity of the disk. However, the purpose of ZBR is not to ensure that the outer tracks store as much data as possible, but rather to optimize the use of the available space on the disk platter.

Here,

Disk manufacturers typically use a combination of techniques, including ZBR, to maximize the storage capacity of their disks, while also ensuring that they meet other important criteria such as performance, reliability, and cost-effectiveness.

To know more about zone bit recording,

https://brainly.com/question/30331112

#SPJ4

the uses operator, coupled with the proc directive, lets you list the names of all registers modified within a procedure and preserves them automatically for you. (True or False)

Answers

False. The uses operator, coupled with the proc directive, lets you list the names of all registers modified within a procedure, but it does not preserve them automatically for you.

The statement is not true as the "uses" operator, when coupled with the "proc" directive, lets you list the names of all registers that the procedure uses and preserves them automatically for you, rather than the ones modified within the procedure. The "uses" operator is used to specify a list of registers that the procedure needs to preserve and restore during execution, typically because they contain important data that would be lost or corrupted otherwise. This helps ensure the correct behavior and consistency of the program.

The "uses" operator is a part of the Pascal programming language, and it is used to declare the registers that the procedure needs to preserve and restore during execution. This operator is typically used when a procedure uses a register that needs to retain its value across the procedure's execution or when a procedure calls another procedure that modifies registers.

When the "uses" operator is coupled with the "proc" directive, it creates a list of registers that the procedure uses and automatically preserves them by pushing them onto the stack. This makes it easier to manage the state of the registers and ensures that their values are preserved across the procedure's execution.

Lear more about programming language here:

https://brainly.com/question/22571603

#SPJ4

what is tthe meaningg of randomly pick numbers

Answers

A random number is one that is selected at random, as the name of the concept suggests, from a set of numbers. There is an equal chance that any given number will be chosen at random for a given distribution.

Picking random numbers is preferable?

Do you think choosing your own numbers or playing Quick Pick is better While playing rapid picks or choosing your own numbers, your chances of winning the lottery are same in both cases.

Random numbers have what purpose?

For example, they can be used to create data encryption keys, simulate and model complex processes, and choose random samples from bigger data sets. Random numbers are also helpful for a range of other tasks.

To know more about random number visit :-

https://brainly.com/question/29582166

#SPJ4

what paste option would you choose if you wanted to maintain the formatting of the copied cell, but not its contents?

Answers

You can utilise Microsoft Excel's "Paste Special" option if you just want to keep the copied cell's formatting and not its content. This will transfer the copied cell(s)' formatting to the chosen cell (s).

Which option for pasting would you pick if you wanted to keep the formatting?

You can paste only plain text, blend the original formatting with the destination formatting, or leave it alone. Continually format sources (K) After using this option, the copied text will still have its formatting.

How can one copy something into Excel and maintain formatting?

To copy the content and formats of a cell, select the cell with the desired format and press Ctrl+C. By clicking on its heading, you can choose the entire column or row that you want to format. Right-click

To know more about Microsoft visit:-

https://brainly.com/question/26695071

#SPJ1

the compiler complains that the getmeasure method has a weaker access level than the measurable interface. why?

Answers

Access levels, commonly referred to as access modifiers, are used in object-oriented programming to regulate the visibility and usability of class members such as fields, methods, and properties.

Why is it vital to make get Measure publicly accessible?

By default, not all methods in a class are public. statement relating class and interface types is accurate Any interface type that a class implements can be converted from a class type.

What takes place when a class implements two interfaces that share the same method?

When a type implements two interfaces, and each interface has a method with the same signature, there is really only one method, and the methods cannot be distinguished from one another. If, for example, the return types of the two methods are incompatible.

To know more about programming visit:-

https://brainly.com/question/11023419

#SPJ1

Kyo is compiling a list of network symptoms of a cyber incident. Which would she not include on her list? Scan Sweeps?

Answers

As a result of a cyber attack, Kyo is preparing a list of network symptoms. Scan Sweeps, would she leave off her list.

Describe a scan sweep?

A Terran building can possess the skill known as scanner sweep. Terrans can see through the fog of war across a wide region by employing a satellite in high orbit, and they can also see all cloaked and underground units nearby.

Describe IP address sweep?

Sending ICMP echo requests (pings) to numerous target addresses constitutes an IP Sweep attack. If the target host responds, the attacker will learn the target's IP address from the response.

To know more about cyber attack visit :-

https://brainly.com/question/29997377

#SPJ4

How to raise exception in python

Answers

You can decide whether to throw an exception as a Python developer if a condition is met. Use the keyword raise to throw (or raise) an exception.

Python exceptions: How are they raised and handled?

The code result = numerator/denominator is contained within the try block in order to handle the exception. The remainder of the try block's code is now bypassed in the event of an exception. Statements contained in the unless block are carried out after it has caught the exception.

As an example, define a rising exception in Python.

Python pointing out a problem. try: "Please enter your roll number," input if roll = 0: if ValueError is not the case, raise ValueError() print("ValueError Exception thrown") ("ValueError Exception thrown") print("Outside of try-except clauses") ("Outside of try-except clauses.") Beyond try-except clauses.

To know more about exception as a Python visit :-

https://brainly.com/question/30389206

#SPJ4

which piece of network hardware keeps a record of the mac address of all devices connected to it and uses this information to direct data packets to the appropriate port?a. serverb. busc. routerd. switch

Answers

A switch is piece of network hardware keeps a record of the mac address of all devices connected to it and uses this information to direct data packets to the appropriate port.

What is Direct data packets?

A network packet is a fundamental unit of data that is bundled and sent over a computer network, often a packet-switched network like the internet.

Each packet or block of data is a component of the entire message and contains necessary address information to help identify the sender computer and the message's intended recipient.

The header, payload, and trailer of a network packet are its three component pieces. The underlying network architecture or protocol employed determines the format and size of a network packet.

Therefore, A switch is piece of network hardware keeps a record of the mac address of all devices connected to it and uses this information to direct data packets to the appropriate port.

To learn more about network, refer to the link:

https://brainly.com/question/14403686

#SPJ1

true or false? a smart card is an example of a logical access control.

Answers

Answer:true

Explanation:becuase the card has to swipe

what is the subnet address for the ipv6 address 2001:d12:aa04:b5::1/64? group of answer choices 2001::/64
2001:D12::/64
2001:D12:AA04::/64
2001:D12:AA04:B5::/64

Answers

The IPv6 address 2001:d12:aa04:subnet b5::1/64's address is 2001:d12:aa04:b5::/64.

What is the IPv6 unicast address's subnet ID?

The first 48 bits of an IPv6 address, or the leftmost set of integers, are known as the site prefix. The site topology is specified by the subnet ID. Both manual and automatic settings are possible for the final 64 bits, or the interface ID.

How many IPv6 subnets are there?

There are 65,535 subnets with more than 18 quintillion devices per subnet thanks to the 16 binary digits set aside for subnetting and the 64 binary digits available for devices.

To know more about IPv6 address visit:-

https://brainly.com/question/30087940

#SPJ4

what is the primary design difference between a laptop and desktop computer?

Answers

The form factor of a laptop and a desktop computer is the main design distinction. A separate monitor, keyboard, and CPU tower or all-in-one computer comprise a desktop computer's larger, more modular form.

A tower or case, a monitor, a keyboard, and a mouse are among the various parts of desktop computers, which are intended to be used on a desk or table. In contrast, laptops have all of its components, such as the screen, keyboard, and trackpad or touchpad, built into a single unit to make them portable and small. The functionality and performance of these two types of computers are impacted by this basic architectural difference. In general, desktops are more upgradeable and customisable than laptops, and they often offer more processor, memory, and storage capacity. On the other hand, laptops are more mobile, adaptable, and fitted with a built-in battery for on-the-go computing.

   

learn more about Desktops here:

brainly.com/question/30052750

#SPJ4

Other Questions
Use the given conditions to write an equation for the line in point-slope form and in slope-intercept form FRQ 1: Respond to all parts of the question. In your response, use substantive examples where appropriate.In May of 2017, congressional leaders introduced the Raise the Wage Act, which would raise the federal minimum wage to $15 an hour by 2024, which is more than double the current level of $7.25 an hour. The legislation is the culmination of a three-year campaign promoted by organized labor known as "Fight for $15." Some cities, such as Seattle, San Francisco, and Los Angeles, have already adopted the $15 minimum wage."What we are here today to say is that a living wage is $15 . . . If you are working 40 or 50 hours a week, you should not be living in poverty," said Sen. Bernie Sanders, I-Vt. However, some economists warn that raising the minimum wage can hurt workers by causing job loss. The Congressional Budget Office estimates that a raise to a more modest $10.10 would cost approximately 500,000 jobs.Describe the ideology that supports the policy issue described in the scenario.Explain how the ideological perspective, described in part A, affects legislative process in Congress on the policy issue.Explain how a major political event, such as the recession that began in 2008, could influence how citizens would behave politically in the context of the scenario. A substance melts when it changes from a __________ to a __________. What are the missing words in this sentence? The root of the word valiant gives a clue that this word means:A. "holding tightly to something."B. "acting with strength and bravery."C. "feeling pleasure or happiness."D. "behaving in a self-serving manner." how did henry ford alter working conditions for his employees? A. Increased their wages B, Give them a weekend off C, Recruit more workforce D. A and B correct what tool makes it easier for users to draw curves in Photoshop? AssessmentMathAnalyticsLanguage artsII.1 Use semicolons and commas to separate clauses 5ZMSubmitScienceRecommendationsAdd a comma or semicolon if needed. Otherwise, submit the text without any additionalpunctuation.Lepidoptera, the name given to an order of insects, comes from the Greek for "scalywinged" it refers to the microscopic scales on the wings of moths, butterflies, andskippers. This orientation holds that consumers will favor those products that offer the most quality, performance, or innovative features.A. The Selling Concept.B. The Product Concept. Explain the stages and principles of motivational interviewing. Do you think motivational interviewing can be effective with clients misusing alcohol and other illegal substances. Archeology helps people and society to make informed decisions about what? I'LL MARK THE BRAINLIESTA car salesperson had $85,460 in total monthly sales in September and $74,570 in October. The salesperson earned a total of $3,485 in commission from those sales combined. What is the salesperson's commission as a percent of the total monthly sales? The money wage rate is constant when moving alonga. only the aggregate supply curve and the potential GDP line.b. the aggregate supply curve, the potential GDP line, and the aggregate demand curve.c. neither the aggregate supply curve nor the potential GDP line.d. only the aggregate supply curve.e. only the potential GDP line. Dentro de un auditorio hay 435 asientos, de tal forma que en la primera fila hay 8 asientos, en la segunda fila hay 11, en la tercera hay 14, y as sucesivamente se forma una sucesin aritmtica. Cuntas sillas hay en la ltima fila? Cuntas filas tiene ese auditorio? Complete the problems about graphing related linear equations.Elias reads 15 pages of his book each day. The graph of p = 15d showshow many pages Elias reads in d days.Before Elias starts reading, Jaime has already read 20 pages of the samebook. Jaime then reads 10 pages each day. The equation p = 10d + 20tells how many pages Jaime has read since Elias started reading.a. Graph Jaime's equation in the same coordinate plane as Elias's graph.What point is on both lines?b. On what day have both Elias and Jaime read the same number ofpages? How many pages have they read on that day? Use your answerto problem 1a to explain. what central concern of early humans does the emphasis on anatomy of the venus willdendorf imply? What is the next fraction in this sequence? Simplify your answer.1/5, 1/3, 7/15, 3/5 Find the function of the graph what is the order of the following instruments: 1. files 2. endodontic explorer 3. gutta-percha 4. paper points 5. glick which team member is responsible for translating a design into a functional product? describe how cell shape differs when the bladder is full and when the bladder is empty.